Checkmarx / red-lili
This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided here is intended for research purposes.
☆11Updated last year
Alternatives and similar repositories for red-lili:
Users that are interested in red-lili are comparing it to the libraries listed below
- CveXplore☆38Updated 3 weeks ago
- CVE.ICU code.☆41Updated this week
- Maturity Model Collaborative project☆15Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆22Updated 3 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 9 months ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 10 months ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated last month
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- ☆44Updated 3 years ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated last year
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Static Token And Credential Scanner☆96Updated last year
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Python Package for burprestapi☆16Updated 5 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- A regular expression fuzzer.☆43Updated 7 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Bundle of security analysis scripts for keras tensorflow models☆13Updated last year